How can the source of a payment data breach be identified?

(Select The Best Answer)